

Lol I wonder if windowscentral and MS got in a feedback loop and that’s why MS was surprised at how much people hate copilot integration with the OS and every program they can shove it into.


Lol I wonder if windowscentral and MS got in a feedback loop and that’s why MS was surprised at how much people hate copilot integration with the OS and every program they can shove it into.
I’d also accept that car Homer designed. Or a cyber truck.
Lmao you hyperbole’d your own statement quoted back at you.
Or have there been cases of KDE preferers/devs doing this to gnome preferers/devs?


Oh I agree, but as long as they can find people to buy their weapons (even on credit that depends on successfully using them) or weild them for them, they won’t be going anywhere. And automation is quickly approaching the point where they won’t even need others to choose to fight.


Problem with arms races is you can’t end them unless everyone agrees to end them, otherwise you just forfeit.


Try a live USB, lets you boot into a linux flavour without needing to install it (plus has handy buttons to start a real install if you desire).
I procrastinated moving to linux for pretty much the same reason. I hated windows more and more with each passing day but wasn’t excited about the part of the learning curve where I was even less effective using linux than I was at using windows.
But I was pleasantly surprised to find I didn’t have to go through that stage at all. The same “discover settings” works for customizing (but it’s better because linux devs don’t have any metrics pushed on them by marketing or MBAs who think user goodwill and patience is infinite when they are “captured”, leading to hidden or buried settings so most users just go with what MS wants).
Setup was easier, though deceptively so because I wasn’t expecting the answer to “gpu drivers?” to be “already installed” and was skeptical until I had a game running. I did do a bunch of reading during the process but could have just used the defaults for most things and kinda regret some where I didn’t (like snapshots are probably worth the disk space they use).
But the best part is that I haven’t had to go on little “ok why the fuck is this <back to the default setting/behaving differently/addressing me without my prompting or a reason worthy of my PC interrupting me>?” adventures and wade through outdated MS help forum posts where if the problem was solved, it wasn’t by the useless MS rep that seems to be struggling just to understand the words being used (indicated by copy/pasting anything that is vaguely related as a response, rather than actually addressing the question) to either figure out how to force it or give up until the next time it annoys me enough to search again.
I haven’t had a single imaginary “it’s my fucking computer, not yours” argument since switching and wish I had just tried sooner because it was way less friction than expected.


That “refusing to continue communication” might have even just been “couldn’t hear or feel vibrations from incoming calls”. It’s also possible he thought they weren’t being helpful and decided it was a waste of time to rely on them (all depends on how that initial call went, though the fact that they say he didn’t ask for help but he says he did could suggest a communication breakdown or tone mismatch).
It did sound like he was unprepared for how to handle such an emergency if they didn’t even use the warming gear they had. But the question is at what point does unpreparedness become criminal and did he really have extra responsibility for her safety even if he thought they were equally experienced, or that she was at least experienced enough to handle her own safety? Unless the defense is lying completely, it sounds like the prosecution isn’t approaching this in good faith and might be seeking revenge instead of justice.


Fwiw, just because a dumb phone doesn’t give you access to “smart” features doesn’t mean the capabilities aren’t present on the phone. It’s just a matter of what could be hidden on the circuit board (lots can be hidden in chips), and what can be hidden in usual expected traffic (if bandwidth requirements are low, even timing of packets could be used to encode hidden data that would never show up in any logs).
Plus the simple tracking of cellphones is necessary for them to function at all.


A robot can theoretically drive better than a human because emotions and boredom don’t have to be involved. But we aren’t there yet and Teslas are trying to solve the hard mode of pure vision without range finding.
Also, I suspect that the ones we have are set up purely as NNs where everything is determined by the training, which likely means there’s some random-ass behaviour for rare edge cases where it “thinks” slamming on the accelerator is as good an option as anything else but since it’s a black box no one really understands, there’s no way to tell until someone ends up in that position.
The tech still belongs in universities, not on public roads as a commercial product/service. Certainly not by the type of people who would at any point say, “fuck it, good enough, ship it like that”, which seems to be most of the tech industry these days.
4k high framerate! But the compression algorithm and settings optimize that down to something between 720p and 1080p. With a half second of input latency when factors line up well.
But don’t worry, soon there will be AI input prediction so that the game can predict what you’ll do and render that before you even do it.
Fast forward 10 years and there’s a generation of kids who think that the difference between a video game and a movie/tv show is that video games let you push buttons to look at other things if you get curious while watching. Or that would be the difference, but it’s actually that you can look around accurately in VGs while it’s more of a “let’s see what the AI spits out if I look this way during this scene… Bahahaha, another dickbutt!”


What a fucking whiny loser. Gets caught cheating and starts crying about how curling is based on trust probably because he exploited that trust to get to the olympics in the first place.
Send him home. Even if it costs the team any medals they have a chance at, better to shut that shit down hard than stand by it to get medals that will be tainted by the whole thing anyways.
Glad I already dgaf about curling or the olympics, otherwise I’d be concerned that remarks like that might make people think that curling should just be a casual backyard sport that doesn’t belong in the Olympics if “trusting your opponents” is more important than “following the rules”.
What a dumb fucker. Hope he doesn’t have a lot of other trash like him to rally around his worthless take.


I’m disappointed that it took seeing that ad for so many people to realize what should have been obvious: ring, along with teslas, and any voice assistant listening devices, or any other cloud-based tech that monitors video, audio, or even other data, can be used to set up an unprecedented surveillance network. Phones are a part of it, too, at the very least as tracking beacons, assuming the mics and cameras aren’t being tapped more often than that little activity dot indicates.
There’s a reason why the venn diagram of people who really understand tech and people who are enthusiastic about most new tech in the last decade and a bit aren’t the same circle. The Snowden revelations weren’t surprising on the “what they are capable of” side of things, though there had been hope before they came out that they weren’t crossing the lines that tech would have easily allowed them to. Just like when zuck bragged about the information fb users just gave him, that wasn’t all new but there was an unspoken (and perhaps naive) rule that admins should respect their users’ privacy.
When I was on the webteam for a gaming community, it would have been trivial to set up the login page to also store all user/password/email combos in a location none of the other team would be likely to notice. We hashed the password in the db, but I could change the source code to do whatever. Even if it was hashed on the client, I could have added a temporary unhashed field and get all the plaintext credentials to check who uses the same password for their email. I didn’t because I respected our users, but from then on just assumed that any site admin could see my credentials and never reuse passwords.
That also applies to Lemmy, btw. At the very least, you shouldn’t use the same password for you email and anything else (though also be aware emails are just sent as plaintext to a bunch of servers while being routed to your email provider).


Yeah, security screws are security theatre. I had an electronics screw driver set that came with a bunch of the rarer screw bits by default. Actually ran into one I didn’t have, then noticed another set with that one (plus other features like the long bendy bit for hard to reach screws) next time I was in the tool section and just bought it.
That said, I won’t be needing this one. Driving a BMW would go against the image I’m trying to cultivate of not being an asshole.


Similar with mp3 bitrate. While I do think I noticed a difference going from 128kbps to 192kbps, anything beyond that I can’t hear a difference for.
Which clearly means I need to dump 15k into my sound setup because it maxes out somewhere between 128kbps and 192kbps!
Edit: dumb -> dump
aound -> sound


I read the comment, then judge the comment and use that judgement and voting scores to judge the community.


Yeah, windows came from a different era where if you’re seeing a new exe, it’s because you put a disk in the drive and explicitly navigated to it. Speaking of which, this isn’t even the first time that convenience ended up opening up a wide security hole because they handled CDs differently and added an autoplay feature that would check the disk for autorun.exe and just run it if autorun was enabled. I started disabling it after word about sony’s rootkits got out but have been appalled to see it enabled by default still ever since then.
I was one of the few that appreciated UAC when it was there and kept it on one of the stricter settings. I’d rather my PC ask than assume, but people bitched about it so they weakened it and eventually just got rid of it entirely I think?
Though a permissions setup would be even better. I didn’t like that UAC was an all or nothing prompt, plus it didn’t give any details about what a program wanted to do. Are you asking because this program is trying to create a new directory in program files or because it wants to replace system32 dlls with its own versions?
It’s an area even Linux can improve in (though probably depends on flavour). I like the android permissions model, where there’s various actions and you can allow or deny categories (though GrapheneOS does it even better by also sandboxing everything). I’d love to see something like that for my desktop, where apps are free to save files but can’t touch files that aren’t their own unless an explicit share is set up, where I might want one app to have network access and no disk access and another to have the opposite. I’d love to be at a state where I could just run any executable from the internet because I know that my OS won’t let it fuck anything up other than its own address space. Hell, could even dedicate a core to monitoring apps to detect if one breaks out of its sandbox without my explicit permission (while the OS also doesn’t use that to enforce the desires of other developers over my own).


If a director’s vision involves either potentially disturbing neighbours or not being able to understand dialogue, fuck their vision. I’d much rather my devices be controlled by what I want, not anyone else’s desires.
And the existence of idiots doesn’t mean everything needs to be limited so that the idiots won’t screw themselves. We exist in an age where if you don’t understand something, you can easily look up information about it. Enshittification might ruin that over time but it hasn’t done so yet. And it can be designed in a way that can make it easier to figure out. Don’t stick it deep in the settings, make it easy to find in “volume settings” or “audio settings” with preset options that cover common sound system setups. If such a system were common, then plenty of people will learn it and know what’s up when grandma’s TV only plays the music track very loudly (which actually might be kinda nice if you just have the TV playing for background noise).


I can’t think of any good reason why links opened via notepad should be treated as trusted. Or any remote exe being treated as trusted regardless of what program is trying to open it, including the windows app store. If anything, the default behavior should be to download the file or open a prompt. I’d call that the second flaw.
Glad to be away from that platform.


Can you elaborate a bit on how notepad following a link can result in running arbitrary code? Cause it sounds more like a second vulnerability is involved, because a text editor following a link still shouldn’t result in running whatever code is on the other side of the link.
Though it is a privacy issue on its own, just like a tracking pixel or images in emails.
I’m also curious what the actual use case is for having a link that notepad automatically follows on load in markdown. Or why they got rid of wordpad (their default rich text editor) and put it into notepad (their plain text editor), ruining one of the reliable things about notepad: it would just show you the actual bytes of the file, whether it was text or not, kinda like a poor man’s hex editor (just without the hex).
Makes me wonder if eventually opening an html file in notepad will make it render it like a browser. “Back in my day, we edited html in notepad instead of browsed it!”
An alternative that will avoid the user agent trick is to curl | cat, which just prints the result of the first command to the console. curl >> filename.sh will write it to a script file that you can review and then mark executable and run if you deem it safe, which is safer than doing a curl | cat followed by a curl | bash (because it’s still possible for the 2nd curl to return a different set of commands).
You can control the user agent with curl and spoof a browser’s user agent for one fetch, then a second fetch using the normal curl user agent and compare the results to detect malicious urls in an automated way.
A command line analyzer tool would be nice for people who aren’t as familiar with the commands (and to defeat obfuscation) and arguments, though I believe the problem is NP, so it won’t likely ever be completely foolproof. Though maybe it can be if it is run in a sandbox to see what it does instead of just analyzed.